2018-12-13 13:39:08 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-05-09 12:01:36 +05:30
|
|
|
module Gitlab
|
|
|
|
module Ci
|
|
|
|
module Pipeline
|
|
|
|
module Seed
|
|
|
|
class Build < Seed::Base
|
|
|
|
include Gitlab::Utils::StrongMemoize
|
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
EnvironmentCreationFailure = Class.new(StandardError)
|
|
|
|
|
2019-12-04 20:38:33 +05:30
|
|
|
delegate :dig, to: :@seed_attributes
|
2018-05-09 12:01:36 +05:30
|
|
|
|
2021-09-30 23:02:18 +05:30
|
|
|
def initialize(context, attributes, previous_stages, current_stage)
|
2021-04-29 21:17:54 +05:30
|
|
|
@context = context
|
|
|
|
@pipeline = context.pipeline
|
2019-12-04 20:38:33 +05:30
|
|
|
@seed_attributes = attributes
|
2021-09-30 23:02:18 +05:30
|
|
|
@stages_for_needs_lookup = if Feature.enabled?(:ci_same_stage_job_needs, @pipeline.project, default_enabled: :yaml)
|
|
|
|
(previous_stages + [current_stage]).compact
|
|
|
|
else
|
|
|
|
previous_stages
|
|
|
|
end
|
|
|
|
|
2019-10-12 21:52:04 +05:30
|
|
|
@needs_attributes = dig(:needs_attributes)
|
2020-03-13 15:44:24 +05:30
|
|
|
@resource_group_key = attributes.delete(:resource_group_key)
|
2021-04-29 21:17:54 +05:30
|
|
|
@job_variables = @seed_attributes.delete(:job_variables)
|
|
|
|
@root_variables_inheritance = @seed_attributes.delete(:root_variables_inheritance) { true }
|
2018-05-09 12:01:36 +05:30
|
|
|
|
2019-12-04 20:38:33 +05:30
|
|
|
@using_rules = attributes.key?(:rules)
|
|
|
|
@using_only = attributes.key?(:only)
|
|
|
|
@using_except = attributes.key?(:except)
|
|
|
|
|
2018-05-09 12:01:36 +05:30
|
|
|
@only = Gitlab::Ci::Build::Policy
|
|
|
|
.fabricate(attributes.delete(:only))
|
|
|
|
@except = Gitlab::Ci::Build::Policy
|
|
|
|
.fabricate(attributes.delete(:except))
|
2019-12-04 20:38:33 +05:30
|
|
|
@rules = Gitlab::Ci::Build::Rules
|
2019-12-26 22:10:19 +05:30
|
|
|
.new(attributes.delete(:rules), default_when: 'on_success')
|
2021-04-17 20:07:23 +05:30
|
|
|
@cache = Gitlab::Ci::Build::Cache
|
2021-04-29 21:17:54 +05:30
|
|
|
.new(attributes.delete(:cache), @pipeline)
|
|
|
|
|
|
|
|
recalculate_yaml_variables!
|
2018-05-09 12:01:36 +05:30
|
|
|
end
|
|
|
|
|
2019-10-12 21:52:04 +05:30
|
|
|
def name
|
|
|
|
dig(:name)
|
|
|
|
end
|
|
|
|
|
2018-05-09 12:01:36 +05:30
|
|
|
def included?
|
|
|
|
strong_memoize(:inclusion) do
|
2019-12-04 20:38:33 +05:30
|
|
|
if @using_rules
|
2019-12-26 22:10:19 +05:30
|
|
|
rules_result.pass?
|
2019-12-04 20:38:33 +05:30
|
|
|
elsif @using_only || @using_except
|
|
|
|
all_of_only? && none_of_except?
|
|
|
|
else
|
|
|
|
true
|
|
|
|
end
|
2019-10-12 21:52:04 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def errors
|
|
|
|
return unless included?
|
|
|
|
|
|
|
|
strong_memoize(:errors) do
|
2021-04-17 20:07:23 +05:30
|
|
|
[needs_errors, variable_expansion_errors].compact.flatten
|
2018-05-09 12:01:36 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def attributes
|
2019-12-04 20:38:33 +05:30
|
|
|
@seed_attributes
|
|
|
|
.deep_merge(pipeline_attributes)
|
|
|
|
.deep_merge(rules_attributes)
|
2021-02-22 17:27:13 +05:30
|
|
|
.deep_merge(allow_failure_criteria_attributes)
|
2021-04-17 20:07:23 +05:30
|
|
|
.deep_merge(@cache.cache_attributes)
|
2021-09-30 23:02:18 +05:30
|
|
|
.deep_merge(runner_tags)
|
2018-05-09 12:01:36 +05:30
|
|
|
end
|
|
|
|
|
2019-03-02 22:35:43 +05:30
|
|
|
def bridge?
|
2019-12-04 20:38:33 +05:30
|
|
|
attributes_hash = @seed_attributes.to_h
|
2019-10-12 21:52:04 +05:30
|
|
|
attributes_hash.dig(:options, :trigger).present? ||
|
|
|
|
(attributes_hash.dig(:options, :bridge_needs).instance_of?(Hash) &&
|
|
|
|
attributes_hash.dig(:options, :bridge_needs, :pipeline).present?)
|
2019-03-02 22:35:43 +05:30
|
|
|
end
|
|
|
|
|
2018-05-09 12:01:36 +05:30
|
|
|
def to_resource
|
|
|
|
strong_memoize(:resource) do
|
2021-03-11 19:13:27 +05:30
|
|
|
processable = initialize_processable
|
|
|
|
assign_resource_group(processable)
|
|
|
|
processable
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def initialize_processable
|
|
|
|
if bridge?
|
|
|
|
::Ci::Bridge.new(attributes)
|
|
|
|
else
|
|
|
|
::Ci::Build.new(attributes).tap do |build|
|
|
|
|
build.assign_attributes(self.class.environment_attributes_for(build))
|
2019-03-02 22:35:43 +05:30
|
|
|
end
|
2018-05-09 12:01:36 +05:30
|
|
|
end
|
|
|
|
end
|
2019-10-12 21:52:04 +05:30
|
|
|
|
2021-03-11 19:13:27 +05:30
|
|
|
def assign_resource_group(processable)
|
|
|
|
processable.resource_group =
|
|
|
|
Seed::Processable::ResourceGroup.new(processable, @resource_group_key)
|
|
|
|
.to_resource
|
|
|
|
end
|
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
def self.environment_attributes_for(build)
|
|
|
|
return {} unless build.has_environment?
|
|
|
|
|
|
|
|
environment = Seed::Environment.new(build).to_resource
|
|
|
|
|
|
|
|
# If there is a validation error on environment creation, such as
|
|
|
|
# the name contains invalid character, the build falls back to a
|
|
|
|
# non-environment job.
|
|
|
|
unless environment.persisted?
|
|
|
|
Gitlab::ErrorTracking.track_exception(
|
|
|
|
EnvironmentCreationFailure.new,
|
|
|
|
project_id: build.project_id,
|
|
|
|
reason: environment.errors.full_messages.to_sentence)
|
|
|
|
|
|
|
|
return { environment: nil }
|
|
|
|
end
|
|
|
|
|
|
|
|
{
|
|
|
|
deployment: Seed::Deployment.new(build, environment).to_resource,
|
|
|
|
metadata_attributes: {
|
|
|
|
expanded_environment_name: environment.name
|
|
|
|
}
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
2019-10-12 21:52:04 +05:30
|
|
|
private
|
|
|
|
|
|
|
|
def all_of_only?
|
2019-12-26 22:10:19 +05:30
|
|
|
@only.all? { |spec| spec.satisfied_by?(@pipeline, evaluate_context) }
|
2019-10-12 21:52:04 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
def none_of_except?
|
2019-12-26 22:10:19 +05:30
|
|
|
@except.none? { |spec| spec.satisfied_by?(@pipeline, evaluate_context) }
|
2019-10-12 21:52:04 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
def needs_errors
|
|
|
|
return if @needs_attributes.nil?
|
|
|
|
|
|
|
|
if @needs_attributes.size > max_needs_allowed
|
|
|
|
return [
|
|
|
|
"#{name}: one job can only need #{max_needs_allowed} others, but you have listed #{@needs_attributes.size}. " \
|
|
|
|
"See needs keyword documentation for more details"
|
|
|
|
]
|
|
|
|
end
|
|
|
|
|
|
|
|
@needs_attributes.flat_map do |need|
|
2021-09-04 01:27:46 +05:30
|
|
|
next if need[:optional]
|
2021-04-17 20:07:23 +05:30
|
|
|
|
2021-09-30 23:02:18 +05:30
|
|
|
result = need_present?(need)
|
2019-10-12 21:52:04 +05:30
|
|
|
|
2021-09-30 23:02:18 +05:30
|
|
|
"'#{name}' job needs '#{need[:name]}' job, but '#{need[:name]}' is not in any previous stage" unless result
|
2019-10-12 21:52:04 +05:30
|
|
|
end.compact
|
|
|
|
end
|
|
|
|
|
2021-09-30 23:02:18 +05:30
|
|
|
def need_present?(need)
|
|
|
|
@stages_for_needs_lookup.any? do |stage|
|
|
|
|
stage.seeds_names.include?(need[:name])
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-10-12 21:52:04 +05:30
|
|
|
def max_needs_allowed
|
2020-11-24 15:15:51 +05:30
|
|
|
@pipeline.project.actual_limits.ci_needs_size_limit
|
2019-10-12 21:52:04 +05:30
|
|
|
end
|
2019-12-04 20:38:33 +05:30
|
|
|
|
2021-04-17 20:07:23 +05:30
|
|
|
def variable_expansion_errors
|
|
|
|
expanded_collection = evaluate_context.variables.sort_and_expand_all(@pipeline.project)
|
|
|
|
errors = expanded_collection.errors
|
|
|
|
["#{name}: #{errors}"] if errors
|
|
|
|
end
|
|
|
|
|
2019-12-04 20:38:33 +05:30
|
|
|
def pipeline_attributes
|
|
|
|
{
|
|
|
|
pipeline: @pipeline,
|
|
|
|
project: @pipeline.project,
|
|
|
|
user: @pipeline.user,
|
|
|
|
ref: @pipeline.ref,
|
|
|
|
tag: @pipeline.tag,
|
|
|
|
trigger_request: @pipeline.legacy_trigger,
|
|
|
|
protected: @pipeline.protected_ref?
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
2019-12-26 22:10:19 +05:30
|
|
|
def rules_attributes
|
2021-02-22 17:27:13 +05:30
|
|
|
strong_memoize(:rules_attributes) do
|
|
|
|
next {} unless @using_rules
|
2019-12-26 22:10:19 +05:30
|
|
|
|
2021-04-17 20:07:23 +05:30
|
|
|
rules_variables_result = ::Gitlab::Ci::Variables::Helpers.merge_variables(
|
|
|
|
@seed_attributes[:yaml_variables], rules_result.variables
|
|
|
|
)
|
2021-03-11 19:13:27 +05:30
|
|
|
|
2021-04-17 20:07:23 +05:30
|
|
|
rules_result.build_attributes.merge(yaml_variables: rules_variables_result)
|
2021-02-22 17:27:13 +05:30
|
|
|
end
|
2019-12-04 20:38:33 +05:30
|
|
|
end
|
|
|
|
|
2019-12-26 22:10:19 +05:30
|
|
|
def rules_result
|
|
|
|
strong_memoize(:rules_result) do
|
|
|
|
@rules.evaluate(@pipeline, evaluate_context)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def evaluate_context
|
|
|
|
strong_memoize(:evaluate_context) do
|
|
|
|
Gitlab::Ci::Build::Context::Build.new(@pipeline, @seed_attributes)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-09-30 23:02:18 +05:30
|
|
|
def runner_tags
|
|
|
|
{ tag_list: evaluate_runner_tags }.compact
|
|
|
|
end
|
|
|
|
|
|
|
|
def evaluate_runner_tags
|
|
|
|
@seed_attributes[:tag_list]&.map do |tag|
|
|
|
|
ExpandVariables.expand_existing(tag, evaluate_context.variables)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-02-22 17:27:13 +05:30
|
|
|
# If a job uses `allow_failure:exit_codes` and `rules:allow_failure`
|
|
|
|
# we need to prevent the exit codes from being persisted because they
|
|
|
|
# would break the behavior defined by `rules:allow_failure`.
|
|
|
|
def allow_failure_criteria_attributes
|
|
|
|
return {} if rules_attributes[:allow_failure].nil?
|
|
|
|
return {} unless @seed_attributes.dig(:options, :allow_failure_criteria)
|
|
|
|
|
|
|
|
{ options: { allow_failure_criteria: nil } }
|
|
|
|
end
|
2021-04-29 21:17:54 +05:30
|
|
|
|
|
|
|
def recalculate_yaml_variables!
|
|
|
|
@seed_attributes[:yaml_variables] = Gitlab::Ci::Variables::Helpers.inherit_yaml_variables(
|
|
|
|
from: @context.root_variables, to: @job_variables, inheritance: @root_variables_inheritance
|
|
|
|
)
|
|
|
|
end
|
2018-05-09 12:01:36 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2021-09-30 23:02:18 +05:30
|
|
|
|
|
|
|
Gitlab::Ci::Pipeline::Seed::Build.prepend_mod_with('Gitlab::Ci::Pipeline::Seed::Build')
|